Cryptography
Cryptography
Cryptography:
Obfuscation: To take something that looks like it makes sense and to hide it
so that doesn't make sense to the outsider.
In information security it is called cryptography. It
provides confidentiality.
Taking original data and make is obfuscated and then taking the
obfuscated data and bring it back to the original form.
These 2 processes are called encryption and decryption.
Ceasar Cipher is one of the oldest type of cryptography. The key in the
ceaser cipher is called ROT (Rotations), it could be ROT 1, ROT 2, ROT 3 and so on.
* Ephemeral Key:
> Temporary
> Provides Perfect Forward Secrecy (PFS)
> Block:
# Encrypts data in chunks
# S-Box: In cryptography, an S-box
(substitution-box) is a basic component of symmetric key algorithms which performs
substitution.
# Symmetric block algorithms: Defined by
Key length, Block size, Number of rounds
> Data Encryption Standard (DES): Block Cipher, 64-bit Block size, 16 Rounds,
Key Size: 56-bit
> Blowfish: Block Cipher, 64-bit Block size, 16 Rounds, Key Size: 32-448 bits
> Triple DES (3DES): Block Cipher 64-bit Block Size, 16 Rounds, Key Size:
168-bit (56-bit X 3)
> AES: Block Cipher, 128-bit Block size, Key Size: 128, 192, 256 bits with
respect to Rounds: 10, 12 or 14
Then it calculates XOR between the input and the IV, the
calculated XOR result is encrypted.
But for the second time it takes the first encrypted IV and
again encrypt it and perform XOR with the second input and then the cipher output
and so on.
# Counter (CTR):
CTR takes and NONCE value concate that into a counter value and encrypt the whole
value using the key.
Then it takes input plain text block perform XOR with the encrypted
value and gives cipher text.
For the next time the counter value increments by 1 and then the
process goes ahead
* Hashing:
* Digital Certificate:
* Trust Models:
* Certificate Types:
> SSL or Web certificates:
Usually subdomains will have an address that begins with something other than
'www.'
# Extended Validation (EV) certificate:
Extended Validation involves a full background check of the organization.
The CA will make sure that the organization exists and is legally
registered as a business,
that they actually are present at the address they list, and so
on.
This validation level takes the longest and costs the most, but
Extended Validation SSL certificates are more trustworthy than other types of SSL
certificates.
# Subject Alternative Name (SAN)
certificate: DigiCert Subject Alternative Name (SAN) Certificates can secure
multiple fully qualified domain names with a single certificate.
- It
attaches a digital signature to the email that verifies that you (and not an
imposter) sent the email,
and
that the email hasn’t been altered since it was sent.
- It
encrypts your emails before they ever leave your mailbox so they can only be opened
by your intended recipients.
This
provides both data in-transit and data at-rest protection.
This is done through the use of public key infrastructure, or PKI for
short.
* Cryptographic Attacks:
* Password Cracking: